Listen "De-Anonymizing Tor"
Episode Synopsis
De-Anonymizing Tor
TOR has been all over the news lately - from embassy private data being pulled from an exit node, to an arrest of a node hoster. This blog post from the ha.ckers.org blog offers code that its creators say can be used to de-anonymize TOR users. The possibilities implied by this code were mentioned at Jeremiah Grossman and Robert Hansen's presentation at this year's Black Hat USA in Las Vegas.
To see their presentation on JavaScript malware from this year's Black Hat USA:
https://blackhat.com/presentation/bh-usa-07/Grossman/Presentation/bh-usa-07-grossman.pdf
To read their whitepaper:
https://blackhat.com/presentation/bh-usa-07/Grossman/Whitepaper/bh-usa-07-grossman.pdf
TOR has been all over the news lately - from embassy private data being pulled from an exit node, to an arrest of a node hoster. This blog post from the ha.ckers.org blog offers code that its creators say can be used to de-anonymize TOR users. The possibilities implied by this code were mentioned at Jeremiah Grossman and Robert Hansen's presentation at this year's Black Hat USA in Las Vegas.
To see their presentation on JavaScript malware from this year's Black Hat USA:
https://blackhat.com/presentation/bh-usa-07/Grossman/Presentation/bh-usa-07-grossman.pdf
To read their whitepaper:
https://blackhat.com/presentation/bh-usa-07/Grossman/Whitepaper/bh-usa-07-grossman.pdf
More episodes of the podcast Black Hat Announcements
Black Hat USA 2010 Training: Assaulting IPS
09/03/2010
Free Black Hat March Webcast - Pen Testing the Web with Firefox by Michael Schearer ("theprez98")
04/03/2010
Black Hat USA 2010 Registration Now Open!
03/03/2010
Feb 18 Webcast
11/02/2010
Black Hat DC Keynote
21/01/2010
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.